Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
5654cc04eae6fe1ff12c3cd9eae53cb8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5654cc04eae6fe1ff12c3cd9eae53cb8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5654cc04eae6fe1ff12c3cd9eae53cb8_JaffaCakes118.html
-
Size
139KB
-
MD5
5654cc04eae6fe1ff12c3cd9eae53cb8
-
SHA1
9a9e61cf507951dcae372e92b18fe6b9b444a30a
-
SHA256
3080b68794c3926e24716577648ef051dfdcf58047424d8f5d6a1447f295924e
-
SHA512
96f41b89109e6cf3316b926311b1503b3fdaeb56e67c23bb38da849dc0cd373b71b0a02dd5f0385fb87b39fb235f3e620b764c8cfd4913dec01cc9eabcc62fe3
-
SSDEEP
1536:SUd91GBqDYUxB7q4hbh7Y+SLlwhQhsYibyLi+rffMxqNisaQx4V5roEIfGJZN8qU:SUdNRv6CyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2024 msedge.exe 2024 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3380 2024 msedge.exe 84 PID 2024 wrote to memory of 3380 2024 msedge.exe 84 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2044 2024 msedge.exe 85 PID 2024 wrote to memory of 2284 2024 msedge.exe 86 PID 2024 wrote to memory of 2284 2024 msedge.exe 86 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87 PID 2024 wrote to memory of 4020 2024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5654cc04eae6fe1ff12c3cd9eae53cb8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa205246f8,0x7ffa20524708,0x7ffa205247182⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2904740883835433486,5666093049486282147,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
5KB
MD551b127b5f113fd2e0c4414f845060128
SHA1b5d9a1d3840a85ad50c3ca974deb7f7af31618a0
SHA256a7a08d02ef34ecd9399b8738a19b2f3a56e2290f53f2ba080d77bb28926b68e6
SHA512593f58f2821b1f76ba221f1885f773e105ce6f3a6f5b72fb359f93f5feed4e59f308ec9b30806fec1dd07b9b5bd0b3a225b1b801d1f04b72c31f93b0e7c94459
-
Filesize
6KB
MD523010d4a9c6b24ded651c43edde79a29
SHA17aff6a1f6812a003a01be8c32de8fe3d6a22b1bf
SHA2569b36b6bd4ed6d1c1143a73c01a20a2e8a37d68474c0bed3cc8852f3617a7ecb6
SHA5128bd33796b2443899a5e377152de88a049dee2f2e6126969b2646dddf5090193be199a92861f9d4d2927b5da1677aa1d41e5c11dbea056938d3636bcc39a3fd6e
-
Filesize
10KB
MD547c3dfa4f334f1fc3a36a4fb8e7706b1
SHA1cbd4a1641bba8e4df01298025148dbeaa0c33eeb
SHA25610f0c55d12c20c13198403ffd1cb10f6f9d5a23ae0ca1aa5838a450986531c8c
SHA512cd4f154e28082335c4265a6425a324fcbf00f42161c9ef6bc58dd7114bbeb0f3221aa6f7e3cba997e0d818258ddcc15f935027601d68452d3dab7a047fec8dd5